Top cyber threats in 2021 – human error exploited, insider threats, and Ransomware as a Service

Cyber threats in 2021 have exceeded the total for 2020 costing companies worldwide an estimated $10.5 trillion. Alarming are not only the costs associated but also their increased sophistication, making the security industry one of the most fast-paced and versatile this year. The term “hack” was coined at MIT in 1955, while the first mention … Read more

DMV course providers can now use typing biometrics to validate student identities

In early 2020, the New York Department of Motor Vehicles (DMV) was one of the first in the U.S. to approve typing biometrics as a compliant technique for student identity validation. In Part 141 of the DMV Commissioner’s Regulations, the New York DMV explicitly mentioned keystroke analysis as an identity validation method for online accident … Read more

User-friendly, typing biometrics-based alternative to TOTP authentication

What is TOTP authentication? TOTP stands for Time-based One-Time Password and is a time-sensitive passcode used only once for authenticating a particular user. The passcode is used for authenticating users and transmitted via SMS, Email, or as a hardware token. TOTP codes are generated through various algorithms that create one-time passcodes using a secret shared … Read more

How to improve your OTP authentication using typing biometrics

What is OTP authentication? One-time password (OTP) authentication relies on a factor that is a password or PIN, sometimes time-sensitive, usually for only one login session or transaction validation. OTP authentication implementations incorporate two-factor authentication by requiring users access to something they have, such as a device like a cellphone, or smartphone.  The use of … Read more

Benefits of an AI-powered MFA Setup

The need for a robust and secure MFA solution is obvious with the rise in frequency (and sophistication) of cyberattacks. IS engineers and product managers frequently struggle to choose between the ease of integration, security, and end-user experience when optimizing their MFA. In this article, we’ll share an AI-powered MFA setup that answers not only … Read more

What 2FA security does Fortnite, Epic Games, Discord and Call of Duty use to protect gamer accounts?

When it comes to gaming, it’s not always fun and games. If the recent Twitch breach which exposed 125GB of the company’s data taught us anything, it’s that the gaming industry is a vulnerable target in cyber attacks. Product Managers need to find 2FA security that will keep users and their sensitive information safe. Interestingly, … Read more

What is 2SV, and what is the difference between 2SV and 2FA?

Terms like single-factor authentication (SFA), two-step verification (2SV), and two-factor authentication (2FA) can sometimes be confusing — even for product managers or security specialists. This article explains the difference between 2SV and 2FA and how to protect your user’s accounts by enabling 2SV as part of a user-friendly 2FA flow. What does 2SV mean?  Two-Step … Read more